Which of the following are serial interfaces?
Which of the following are serial interfaces?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following should the security administrator do to ensure the firewall platform is appropriate for
An Association is preparing to upgrade their firewalls at five locations around the United States.
Each of the three vendor’s RFP responses is in-line with the security and other requirements.
Which of the following should the security administrator do to ensure the firewall platform is
appropriate for the Association?
What is the most likely cause?
Rick works as a Network Administrator for uCertify Inc. He takes a backup of some important compressed
files on an NTFS partition, using the Windows 2000 Backup utility. Rick restores these files in a FAT32
partition. He finds that the restored files do not have the compression attribute.
What is the most likely cause?
Which of the following MOST likely happened?
A UNIX administrator notifies the storage administrator that extra LUNs can be seen on a UNIX
server. The LUNs appear to be NTFS file systems. Which of the following MOST likely happened?
Based on this information, the following tasks should be completed:
CORRECT TEXT
The IDS has detected abnormal behavior on this network. Click on the network devices to view
device information. Based on this information, the following tasks should be completed:
1. Select the server that is a victim of a cross-site scripting (XSS) attack.
2 Select the source of the brute force password attack.
3. Modify the access control list (ACL) on the router(s) to ONLY block the XSS attack.
Instructions: Simulations can be reset at anytime to the initial state: however, all selections will be deleted
Which of the following is a more cost effective alternative to buying a new SAN?
Company ABC’s SAN is nearing capacity, and will cause costly downtimes if servers run out disk
space. Which of the following is a more cost effective alternative to buying a new SAN?
Which of the following SCSI IDs is generally recommended for the CD-ROM drive?
Which of the following SCSI IDs is generally recommended for the CD-ROM drive?
Which of the following would be the FIRST process to perform as a result of these findings?
A new internal network segmentation solution will be implemented into the enterprise that consists
of 200 internal firewalls. As part of running a pilot exercise, it was determined that it takes three
changes to deploy a new application onto the network before it is operational. Security now has a
significant affect on overall availability. Which of the following would be the FIRST process to
perform as a result of these findings?
Which of the following types of attacks is the user attempting?
select id, firstname, lastname from authors
User input= firstname= Hack;man
lastname=Johnson
Which of the following types of attacks is the user attempting?
Which of the following types of display takes the least space on a desk?
Which of the following types of display takes the least space on a desk?